Search results
29 paź 2023 · Abstract. This paper seeks to shed light on these evolving complexities, ultimately emphasizing the urgent need for a comprehensive, holistic understanding of modern-day cyber conflicts and their...
1 sty 2023 · In this paper, we perform a comprehensive review and analysis of typical data breach incidents. We investigate threat actors, security flaws, and vulnerabilities that often lead to data...
6 sty 2020 · PDF | There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats... | Find, read and cite all the...
1 cze 2022 · Understanding what leads to a data breach involves understanding how organizations make security-relevant business decisions, how attackers choose their targets, and how systems of people and procedures fail at maintaining security.
9 cze 2017 · This review helps interested readers to learn about enterprise data leak threats, recent data leak incidents, various state-of-the-art prevention and detection techniques, new challenges, and promising solutions and exciting opportunities. WIREs Data Mining Knowl Discov 2017, 7:e1211. doi: 10.1002/widm.1211.
5 lis 2023 · Recognizing the importance of understanding and preventing data breaches, this exploratory study adopts a novel approach, namely, applying machine learning and text analytics to the interpretation of data breach court cases.
30 gru 2016 · Journal Article. Hype and heavy tails: A closer look at data breaches. Benjamin Edwards. , Steven Hofmeyr. , Stephanie Forrest. Journal of Cybersecurity, Volume 2, Issue 1, December 2016, Pages 3–14, https://doi.org/10.1093/cybsec/tyw003. Published: 30 December 2016. Article history. PDF. Split View. Cite. Permissions. Share.